Efficient Privacy-Preserving Protocol for k-NN Search over Encrypted Data in Location-Based Service

被引:4
作者
Lian, Huijuan [1 ]
Qiu, Weidong [1 ]
Yan, Di [2 ]
Huang, Zheng [1 ]
Guo, Jie [1 ]
机构
[1] Shanghai Jiao Tong Univ, Sch Cyber Secur, Shanghai 200240, Peoples R China
[2] Shanghai Jiao Tong Univ, Dept Comp Sci & Engn, Shanghai, Peoples R China
关键词
ANONYMITY; PROTECTION;
D O I
10.1155/2017/1490283
中图分类号
O1 [数学];
学科分类号
0701 ; 070101 ;
摘要
With the development of mobile communication technology, location-based services (LBS) are booming prosperously. Meanwhile privacy protection has become the main obstacle for the further development of LBS. The k-nearest neighbor (k-NN) search is one of the most common types of LBS. In this paper, we propose an efficient private circular query protocol (EPCQP) with high accuracy rate and low computation and communication cost. We adopt the Moore curve to convert two-dimensional spatial data into one-dimensional sequence and encrypt the points of interest (POIs) information with the Brakerski-Gentry-Vaikuntanathan homomorphic encryption scheme for privacy-preserving. The proposed scheme performs the secret circular shift of the encrypted POIs information to hide the location of the user without a trusted third party. To reduce the computation and communication cost, we dynamically divide the table of the POIs information according to the value of k. Experiments show that the proposed scheme provides high accuracy query results while maintaining low computation and communication cost.
引用
收藏
页数:14
相关论文
共 47 条
[1]  
[Anonymous], 1978, FDN SEC COMPUT
[2]  
Bettini C, 2009, LECT NOTES COMPUT SC, V5599, P1, DOI 10.1007/978-3-642-03511-1_1
[3]  
Brakerski Zvika, 2014, ACM Transactions on Computation Theory, V6, DOI 10.1145/2633600
[4]  
Chen X., 2013, P 3 ACM C DAT APPL S, P37, DOI DOI 10.1145/2435349.2435354
[5]  
Chen X., 2012, P 2 ACM C DAT APPL S, P49
[6]   Casper: Query Processing for Location Services without Compromising Privacy [J].
Chow, Chi-Yin ;
Mokbel, Mohamed F. ;
Aref, Walid G. .
ACM TRANSACTIONS ON DATABASE SYSTEMS, 2009, 34 (04)
[7]  
Coron JS, 2012, LECT NOTES COMPUT SC, V7237, P446, DOI 10.1007/978-3-642-29011-4_27
[8]  
Dewri R, 2010, L N INST COMP SCI SO, V50, P71
[9]   Homomorphic Evaluation of the AES Circuit [J].
Gentry, Craig ;
Halevi, Shai ;
Smart, Nigel P. .
ADVANCES IN CRYPTOLOGY - CRYPTO 2012, 2012, 7417 :850-867
[10]   Fully Homomorphic Encryption without Squashing Using Depth-3 Arithmetic Circuits [J].
Gentry, Craig ;
Halevi, Shai .
2011 IEEE 52ND ANNUAL SYMPOSIUM ON FOUNDATIONS OF COMPUTER SCIENCE (FOCS 2011), 2011, :107-116